876
Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content]
« Last post by Renegade on December 28, 2014, 08:32 AM »Getting out of a chair can be exhausting!
Shitlord



Ah! Here's the link.-40hz (December 26, 2014, 01:17 PM)
"This film represents our commitment to our filmmakers and free speech,"
I was thinking more:
Renegade: (see attachment in previous post)
40hz: (see attachment in previous post)-4wd (December 21, 2014, 08:18 PM)


The other property it is important to highlight is a unique characteristic of the ECDSA signature verification algorithm. In most asymmetric cryptosystems, a function V(K, S, T) takes the public key, signature, and signed text as parameters and returns a simple true/false value indicating whether the signature is valid or not. This is the behavior of RSA, for example. In ECDSA, however, a verification function takes only two parameters, S and T, and returns K. The signature is valid if the returned K matches the signer’s public key. This is a significant difference, as both the client and server in the above Login protocol use signatures to recover the other party’s public key, which they then look up on the blockchain to determine the other party’s identity. In other words, the signature verification is not used to determine if the signature is valid, but to determine the identity of the other party.
Thus, given the semantic security of ECDSA and ECDH, the worst attack a malicious party with full control over the communication medium could leverage is denial of service.
Slur
you're going to hate it.
Introducing Slur
Slur is an open source, decentralized and anonymous marketplace for the selling of secret information in exchange for bitcoin. Slur is written in C and operates over the Tor network with bitcoin transactions through libbitcoin. Both buyers and sellers are fully anonymous and there are no restrictions on the data that is auctioned. There is no charge to buy or sell on the Slur marketplace except in the case of a dispute, where a token sum is paid to volunteers.
...
The types of information we expect to see on the Slur marketplace ;
- Trade secrets.
- Designs for every type of consumer product.
- The source code for proprietary operating systems and high end CAD software.
- Zero day exploits. For the market defined value rather than a price determined by the corporations under the guise of a bounty with the veiled threat of legal action should the researcher choose to sell elsewhere.
- The details of backdoors covertly installed inside industrial and consumer hardware and software.
- Stolen databases. Corporations will no longer be able to get away with an apology when they fail to secure their customers confidential data. They will have to pay the market value to suppress it.
- Proof of tax evasion from disgruntled or underpaid employees. Both the IRS and the public have an interest in that information and the corporations will have to bid to suppress it - a very quantifiable and predictable payoff for the seller.
- Military intelligence relevant to real-time conflicts.
- Aerospace and defense designs.
- Evidence relevant to ongoing trials.
- Unflattering celebrity photos and videos.
- The complete databases of social media sites like facebook.
- Proof of government corruption. Close to an election.
)The Smelliest Food in the World-Arizona Hot (December 23, 2014, 07:39 AM)
10 things that aren't illegal but should be-Arizona Hot (December 23, 2014, 07:43 AM)
Probably the only thing I've seen out there remotely close to being secure and of similar functionality to email is in fact bitcoin, which allows you to attach a text message to a transaction that is encrypted as it is carried by the blockchain and is only viewable by the intended recipient.
But people are already worried about blockchain bloat, if you attached email's traffic volume to the blockchain the storage requirements would increase exponentially.-SeraphimLabs (December 22, 2014, 07:59 AM)

I have to disagree with their refusal to comply on the grounds that it already leaked. This becomes a means of defeating freedom of information requests.
To exploit this, they accidentally on purpose leak a fake version of the document that is either censored or contains a different message than the actual message being requested.
Compliance should be required anyway as per the law, and since it already apparently leaked they should have no problems in doing so because people already know what it should say.-SeraphimLabs (December 21, 2014, 02:42 AM)

Speaking of carrots ..(see attachment in previous post)
-crabby3 (December 18, 2014, 07:28 AM)


Speaking of breakfast(see attachment in previous post)
-crabby3 (December 18, 2014, 07:20 AM)